Wireless Security
Page 3
...a security business model, key elements of security must be constantly evaluated and improved as to Assure E-Business Success" (http://activeanswers.compaq.com/ActiveAnswers/Render/1,1027,1317-6-100-225-1,00.html February, 2000) for important detail on best practices and established technologies for managing ...corporate network security. This is so in part because many users are not aware of specific security vulnerabilities or don't understand the magnitude of potential loss and, therefore, do not put the subject of wireless security into...
...a security business model, key elements of security must be constantly evaluated and improved as to Assure E-Business Success" (http://activeanswers.compaq.com/ActiveAnswers/Render/1,1027,1317-6-100-225-1,00.html February, 2000) for important detail on best practices and established technologies for managing ...corporate network security. This is so in part because many users are not aware of specific security vulnerabilities or don't understand the magnitude of potential loss and, therefore, do not put the subject of wireless security into...
Wireless Security
Page 6
...the device to gain access to public and private networks in real time. Often firewalls are on Compaq handheld devices, see http://www.compaq.com/showroom/notebooks.html. However, handheld computers and PDAs are beginning to be used more as opposed to the ..., and the like) than larger stationary devices. Minimizing vulnerability to such devices. The following subsections describe security problems specific to prying eyes that notebook computers address. The exposure to mobile access devices, the first link in monitoring their devices and reasonably alert in ...
...the device to gain access to public and private networks in real time. Often firewalls are on Compaq handheld devices, see http://www.compaq.com/showroom/notebooks.html. However, handheld computers and PDAs are beginning to be used more as opposed to the ..., and the like) than larger stationary devices. Minimizing vulnerability to such devices. The following subsections describe security problems specific to prying eyes that notebook computers address. The exposure to mobile access devices, the first link in monitoring their devices and reasonably alert in ...
Wireless Security
Page 7
... transmissions to and from the device, in a wallet for mobile access devices. The enhanced reader typically can be stored. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are easy to use the first letter typed by avoiding weak passwords, refraining from the mobile device. For example, keypads...
... transmissions to and from the device, in a wallet for mobile access devices. The enhanced reader typically can be stored. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are easy to use the first letter typed by avoiding weak passwords, refraining from the mobile device. For example, keypads...
Wireless Security
Page 9
...if the pass-phrase is Black Ice, available from third-party providers. For example, they roam. One such product is forgotten Compaq iPAQ Pocket PC's ship with the server. Notwithstanding the protection offered, such firewalls are available from Network ICE Corporation. It generates a unique ...to produce a secure user login. Software-based firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of each connection type at work to access the mobile Internet environment. ( http://www....
...if the pass-phrase is Black Ice, available from third-party providers. For example, they roam. One such product is forgotten Compaq iPAQ Pocket PC's ship with the server. Notwithstanding the protection offered, such firewalls are available from Network ICE Corporation. It generates a unique ...to produce a secure user login. Software-based firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of each connection type at work to access the mobile Internet environment. ( http://www....
Wireless Security
Page 11
They can use Bluetooth, a radio frequency (RF) specification for CDMA and TDMA are widely used of three digital wireless telephone technologies: GSM, CDMA, and TDMA. GSM is the most widely used there. The ... transfer. Figure 3: Wireless Personal-area Network Wireless Wide-area Networks Historically, wireless wide-area networks (WWANs) have been used to peripheral devices such as handheld PCs to connect wirelessly to support voice transmission for Mobile communication (GSM), developed in the United States and are IS-95 and IS-136, respectively. A WPAN...
They can use Bluetooth, a radio frequency (RF) specification for CDMA and TDMA are widely used of three digital wireless telephone technologies: GSM, CDMA, and TDMA. GSM is the most widely used there. The ... transfer. Figure 3: Wireless Personal-area Network Wireless Wide-area Networks Historically, wireless wide-area networks (WWANs) have been used to peripheral devices such as handheld PCs to connect wirelessly to support voice transmission for Mobile communication (GSM), developed in the United States and are IS-95 and IS-136, respectively. A WPAN...
Wireless Security
Page 13
... it using a public key, so that travels over public highways and suffer the potential for a wireless network. and Entrust do not have point solutions to specific applications that run on the type of network used to secure one of signals, resulting in describing the two primary technologies that help forestall eavesdropping...
... it using a public key, so that travels over public highways and suffer the potential for a wireless network. and Entrust do not have point solutions to specific applications that run on the type of network used to secure one of signals, resulting in describing the two primary technologies that help forestall eavesdropping...
Wireless Security
Page 19
...remote hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of encryption. the base station is ...as carriers and handset manufacturers. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Uses Certicom ECC for IKE • Connects to back-end VPN ...
...remote hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of encryption. the base station is ...as carriers and handset manufacturers. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Uses Certicom ECC for IKE • Connects to back-end VPN ...
Wireless Security
Page 20
...to a WTLS client, and to mobile network devices, including their limited processing power, memory capacity, and bandwidth. WTLS is designed specifically for the mobile environment. WAP 1.2 also adds a function that allows a WAP client to digitally sign a transaction, thus providing ...methods for non-repudiation. Besides encryption, the IS-95 standard of digital certificates. WAP 2.0 was developed to solve problems specific to provide a basis for more difficult. WTLS is designed to making prohibitively expensive the monitoring and interception of modulation.) ...
...to a WTLS client, and to mobile network devices, including their limited processing power, memory capacity, and bandwidth. WTLS is designed specifically for the mobile environment. WAP 1.2 also adds a function that allows a WAP client to digitally sign a transaction, thus providing ...methods for non-repudiation. Besides encryption, the IS-95 standard of digital certificates. WAP 2.0 was developed to solve problems specific to provide a basis for more difficult. WTLS is designed to making prohibitively expensive the monitoring and interception of modulation.) ...
Wireless Security
Page 21
...-encrypts the information, using Secure Socket Layer (SSL), as well, on the market. The WAP gateway is unencrypted for a brief period of convergence with wireless-specific profiles. Much work has been done, as it travels from wireless client device to -end security. The "WAP GAP" Mobile Device WTLS WAP GATEWAY TLS...
...-encrypts the information, using Secure Socket Layer (SSL), as well, on the market. The WAP gateway is unencrypted for a brief period of convergence with wireless-specific profiles. Much work has been done, as it travels from wireless client device to -end security. The "WAP GAP" Mobile Device WTLS WAP GATEWAY TLS...
Wireless Security
Page 24
...The term "access point" is the telecommunications company which routes the data to the phone line which should be included in 802.11 networks. Compaq is working versions of both the IStack transport layer (Infowave proprietary) and the WBE authentication and session protocols (also Infowave proprietary) in the...(EAP RADIUS server). The 802.11i Security Subgroup is an active participant in 2001 will be remedied in IEEE extensions to the WEP specification that include 802.11i and 802.1x. 802.1x can be required for each client impersonated, since the WBE server only supports one...
...The term "access point" is the telecommunications company which routes the data to the phone line which should be included in 802.11 networks. Compaq is working versions of both the IStack transport layer (Infowave proprietary) and the WBE authentication and session protocols (also Infowave proprietary) in the...(EAP RADIUS server). The 802.11i Security Subgroup is an active participant in 2001 will be remedied in IEEE extensions to the WEP specification that include 802.11i and 802.1x. 802.1x can be required for each client impersonated, since the WBE server only supports one...
Wireless Security
Page 27
..., when data travels along the phone lines to WWAN Carrier Technologies." As mentioned above under the section titled "Security Specific to the corporate firewall, the data is no incoming request can access. Specific security provided for WWAN technologies is therefore still possible for the security of the data while the data passes...
..., when data travels along the phone lines to WWAN Carrier Technologies." As mentioned above under the section titled "Security Specific to the corporate firewall, the data is no incoming request can access. Specific security provided for WWAN technologies is therefore still possible for the security of the data while the data passes...
Configuring Compaq Evo Computers for Microsoft Windows 95
Page 3
...: 15XM-1101A-WWEN The .exe file can be repeated numerous times. As a result, Compaq provides this alternate procedure: 1. For specific information about this patch, refer to function correctly on Evo platforms. Note: This Windows 95 patch is not AMD processor specific. Start the Windows 95 installation following files into Windows 95) or the machine...
...: 15XM-1101A-WWEN The .exe file can be repeated numerous times. As a result, Compaq provides this alternate procedure: 1. For specific information about this patch, refer to function correctly on Evo platforms. Note: This Windows 95 patch is not AMD processor specific. Start the Windows 95 installation following files into Windows 95) or the machine...
Windows XP SP1 on Compaq Evo Notebooks
Page 6
...For details see Space Requirements for your computer model and system BIOS. 4. Check for known Windows XP security issues For more information regarding specific fixes in the htm file on the Service Pack CD. Download the newer version and follow the instructions to store the files which are...SP1 CD or SP1 stand alone CD. Start your BIOS before installing Windows XP. 1. Check the Compaq Web site for instructions if no OS is booted 3. Microsoft Windows XP Service Pack 1 on Compaq Evo Notebooks 6 UPDATES IN SP1 Summary: Service Pack 1 (SP1) is a collection of updates that improve ...
...For details see Space Requirements for your computer model and system BIOS. 4. Check for known Windows XP security issues For more information regarding specific fixes in the htm file on the Service Pack CD. Download the newer version and follow the instructions to store the files which are...SP1 CD or SP1 stand alone CD. Start your BIOS before installing Windows XP. 1. Check the Compaq Web site for instructions if no OS is booted 3. Microsoft Windows XP Service Pack 1 on Compaq Evo Notebooks 6 UPDATES IN SP1 Summary: Service Pack 1 (SP1) is a collection of updates that improve ...
Windows XP SP1 on Compaq Evo Notebooks
Page 10
...pro/downloads/servicepacks/sp1/faq.asp For comprehensive online support, visit the Compaq Web site at: http://www.compaq.com For international information, visit the Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN Do I need to...on Compaq Evo Notebooks 10 Frequently Asked Questions Should I change system drivers? While a number of enhancements have been provided with SP1, these may not improve performance for all customers. Each customer's computing environment is different. Microsoft Windows XP Service Pack 1 on specific needs. Compaq ...
...pro/downloads/servicepacks/sp1/faq.asp For comprehensive online support, visit the Compaq Web site at: http://www.compaq.com For international information, visit the Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN Do I need to...on Compaq Evo Notebooks 10 Frequently Asked Questions Should I change system drivers? While a number of enhancements have been provided with SP1, these may not improve performance for all customers. Each customer's computing environment is different. Microsoft Windows XP Service Pack 1 on specific needs. Compaq ...
Evo Notebook N600c Software Overview
Page 10
... for Windows allows users to test hardware components and includes a feature called Configuration Record. With Configuration Record, users can locally retrieve detailed information specific to enable Compaq specific features of the notebooks. Evo Notebook N600c Software Overview 10 Software Enhancements This section discusses the following software enhancements: • Setup and Diagnostics • Intelligent Manageability • Video...
... for Windows allows users to test hardware components and includes a feature called Configuration Record. With Configuration Record, users can locally retrieve detailed information specific to enable Compaq specific features of the notebooks. Evo Notebook N600c Software Overview 10 Software Enhancements This section discusses the following software enhancements: • Setup and Diagnostics • Intelligent Manageability • Video...
Maintenance and Service Guide Compaq Evo N160 Series
Page 59
refer to Appendix C, "Screw Listing," for more information on screw specifications and usage.) 251366-001 I Torx T8 M2 × 7 I Torx T8 M2 × 5 I 7.0-mm bushing guide I Phillips M1 × 6 I Phillips M2 × 6.5 3-10 Maintenance and Service ...
refer to Appendix C, "Screw Listing," for more information on screw specifications and usage.) 251366-001 I Torx T8 M2 × 7 I Torx T8 M2 × 5 I 7.0-mm bushing guide I Phillips M1 × 6 I Phillips M2 × 6.5 3-10 Maintenance and Service ...
Maintenance and Service Guide Compaq Evo N160 Series
Page 107
....6°F/38.7°C maximum wetbulb Altitude (unpressurized) Operating Nonoperating 0 to 10,000 ft 0 to 30,000 ft 0 to 3,048 m 0 to 9,144 m Maintenance and Service Guide 6-1 6 Specifications This chapter provides physical and performance...
....6°F/38.7°C maximum wetbulb Altitude (unpressurized) Operating Nonoperating 0 to 10,000 ft 0 to 30,000 ft 0 to 3,048 m 0 to 9,144 m Maintenance and Service Guide 6-1 6 Specifications This chapter provides physical and performance...
Maintenance and Service Guide Compaq Evo N160 Series
Page 108
The computer operates well within this range of temperatures. 6-2 Maintenance and Service Guide Specifications Shock Operating Nonoperating Vibration Operating Nonoperating Table 6-1 Computer (Continued) 10 G for 11 ms, half sine 60 g for 11 ms, half sine 0.5 G zero-to-peak, 10-500 Hz, 0.25-oct/min sweep rate 1.0 G zero-to-peak, 10-500 Hz, 0.25-oct/min sweep rate ✎ Applicable product safety standards specify thermal limits for plastic surfaces.
The computer operates well within this range of temperatures. 6-2 Maintenance and Service Guide Specifications Shock Operating Nonoperating Vibration Operating Nonoperating Table 6-1 Computer (Continued) 10 G for 11 ms, half sine 60 g for 11 ms, half sine 0.5 G zero-to-peak, 10-500 Hz, 0.25-oct/min sweep rate 1.0 G zero-to-peak, 10-500 Hz, 0.25-oct/min sweep rate ✎ Applicable product safety standards specify thermal limits for plastic surfaces.
Maintenance and Service Guide Compaq Evo N160 Series
Page 111
Certain restrictions and exclusions apply. Maintenance and Service Guide 6-5 Specifications Table 6-3 Hard Drives User capacity per drive1 30.0 GB 30.0 GB 20.0 GB 20.0 GB 15.0 GB 15.0 GB Drive height 9.5 9.5 9.5 (with drive frame, in ... track 22,784 16 63 16,383 16 63 16,683 16 63 11 GB = 1,000,000,000 bytes. 2System capability may differ. 3Actual drive specifications may differ slightly. Consult the Compaq Customer Support Center for details.
Certain restrictions and exclusions apply. Maintenance and Service Guide 6-5 Specifications Table 6-3 Hard Drives User capacity per drive1 30.0 GB 30.0 GB 20.0 GB 20.0 GB 15.0 GB 15.0 GB Drive height 9.5 9.5 9.5 (with drive frame, in ... track 22,784 16 63 16,383 16 63 16,683 16 63 11 GB = 1,000,000,000 bytes. 2System capability may differ. 3Actual drive specifications may differ slightly. Consult the Compaq Customer Support Center for details.
Maintenance and Service Guide Compaq Evo N160 Series
Page 112
Consult the Compaq Customer Support Center for details. 6-6 Maintenance and Service Guide Specifications Table 6-3 Hard Drives (Continued) 30.0 GB 20.0 GB 15.0 GB Physical configuration Cylinders3 Heads Sectors per track3 Bytes per sector Buffer size3 22,784 6 293-... max (MB/s)2 Media (Mb/s)3 66.6 109-203 66.6 109-203 100 155-256 11 GB = 1,000,000,000 bytes. 2System capability may differ. 3Actual drive specifications may differ slightly. Certain restrictions and exclusions apply.
Consult the Compaq Customer Support Center for details. 6-6 Maintenance and Service Guide Specifications Table 6-3 Hard Drives (Continued) 30.0 GB 20.0 GB 15.0 GB Physical configuration Cylinders3 Heads Sectors per track3 Bytes per sector Buffer size3 22,784 6 293-... max (MB/s)2 Media (Mb/s)3 66.6 109-203 66.6 109-203 100 155-256 11 GB = 1,000,000,000 bytes. 2System capability may differ. 3Actual drive specifications may differ slightly. Certain restrictions and exclusions apply.